<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-05-13T14:41:55</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1748352587" version="1">
      <metadata>
        <title>alt-python36: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1748352587" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1748352587" source="CLSA"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" source="CVE"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" source="CVE"/>
        <description>- CVE-2023-24329: make urllib.parse.urlparse enforce that a scheme must
  begin with an alphabetical ASCII character
- CVE-2023-40217: check for &amp; avoid the ssl pre-close flaw
- CVE-2024-6232: remove backtracking when parsing tarfile headers
- CVE-2024-7592: fix quadratic complexity in parsing double-quoted cookie
  values with backslashes</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-05-27"/>
          <updated date="2025-05-27"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587003"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587005"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587007"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587009"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587011"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-6.el9" test_ref="oval:com.tuxcare.clsa:tst:1748352587013"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1749037854" version="1">
      <metadata>
        <title>alt-python36: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1749037854" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1749037854" source="CLSA"/>
        <reference ref_id="CVE-2007-4559" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2007-4559" source="CVE"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-6597" source="CVE"/>
        <description>- CVE-2007-4559: implement PEP 706 - a filter in the tarfile module to
  prevent directory traversal vulnerability
- CVE-2023-6597: prevent tempfile.TemporaryDirectory class dereference
  symlinks</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-06-04"/>
          <updated date="2025-06-04"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cwe="CWE-22" href="https://cve.tuxcare.com/els-lang/cve/CVE-2007-4559" impact="moderate" public="20070828">CVE-2007-4559</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-7.el9" test_ref="oval:com.tuxcare.clsa:tst:1749037854007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753205878" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2019-9674</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753205878" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1753205878" source="CLSA"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <description>- CVE-2019-9674: add pitfalls to zipfile module documentation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-22"/>
          <updated date="2025-07-22"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-8.el9" test_ref="oval:com.tuxcare.clsa:tst:1753205878007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753804881" version="1">
      <metadata>
        <title>alt-python27: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753804881" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1753804881" source="CLSA"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <reference ref_id="CVE-2022-48560" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48560" source="CVE"/>
        <reference ref_id="CVE-2022-48565" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48565" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2022-0391" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-0391" source="CVE"/>
        <description>- CVE-2022-45061: fix quadratic time idna decoding
- CVE-2019-9674: add pitfalls to zipfile module documentation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-29"/>
          <updated date="2025-07-29"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48560" impact="important" public="20230822">CVE-2022-48560</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48565" impact="critical" public="20230822">CVE-2022-48565</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-0391" impact="important" public="20220209">CVE-2022-0391</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881003"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881005"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881007"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881009"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881011"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-14.el9" test_ref="oval:com.tuxcare.clsa:tst:1753804881013"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1754039871" version="1">
      <metadata>
        <title>alt-python27: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1754039871" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1754039871" source="CLSA"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2020-8492" source="CVE"/>
        <reference ref_id="CVE-2022-48566" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48566" source="CVE"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2021-3733" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2021-3733" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" source="CVE"/>
        <description>- CVE-2023-27043: reject malformed addresses in email.parseaddr()
- CVE-2020-8492: fix regex in AbstractBasicAuthHandler
- CVE-2021-3733: fix regex in AbstractBasicAuthHandler</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-01"/>
          <updated date="2025-08-01"/>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2020-8492" impact="moderate" public="20200130">CVE-2020-8492</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-362" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-48566" impact="moderate" public="20230822">CVE-2022-48566</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2021-3733" impact="moderate" public="20220310">CVE-2021-3733</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1754039871007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760098218" version="1">
      <metadata>
        <title>alt-python27: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760098218" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760098218" source="CLSA"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2021-3737" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" source="CVE"/>
        <description>- CVE-2021-3737: stop reading a header if it's too long
- CVE-2019-20907: avoid infinite loop in the tarfile module
- Build and testing fixes in spec</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" impact="important" public="20200713">CVE-2019-20907</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" impact="important" public="20220304">CVE-2021-3737</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1760098218007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760369183" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2020-26116</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760369183" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760369183" source="CLSA"/>
        <reference ref_id="CVE-2020-26116" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" source="CVE"/>
        <description>- CVE-2020-26116: prevent http header injection in httplib</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:P/A:N" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" impact="important" public="20200927">CVE-2020-26116</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1760369183007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1762528386" version="1">
      <metadata>
        <title>alt-python36: Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2025:1762528386" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1762528386" source="CLSA"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <description>- Fix CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4435,
  CVE-2025-4517: fix multiple tarfile extraction filter bypasses
  (filter="tar"/filter="data")
- fix test_tarfile.py</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-07"/>
          <updated date="2025-11-07"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-13.el9" test_ref="oval:com.tuxcare.clsa:tst:1762528386007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771339135" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2025-13837</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771339135" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771339135" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>- CVE-2025-13837: fix memory denial of service in plistlib</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-16.el9" test_ref="oval:com.tuxcare.clsa:tst:1771339135007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772111352" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2015-20107</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772111352" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772111352" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>- CVE-2015-20107: mailcap: sanitize the second argument which allowing
  shell commands injection</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1772111352007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772139704" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2015-20107</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772139704" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772139704" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>- CVE-2015-20107: sanitize the second argument, which allows shell
  command injection in the mailcap module</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-17.el9" test_ref="oval:com.tuxcare.clsa:tst:1772139704007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772188508" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2025-12084</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772188508" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772188508" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>- CVE-2025-12084: remove quadratic behavior in xml.minidom
  node ID cache clearing</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-27"/>
          <updated date="2026-02-27"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1772188508007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772446514" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2025-6075</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772446514" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772446514" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>- CVE-2025-6075: fix quadratic complexity in os.path.expandvars()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-18.el9" test_ref="oval:com.tuxcare.clsa:tst:1772446514007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772559514" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2025-8194</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772559514" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772559514" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>- CVE-2025-8194: tarfile: validate archives to ensure member offsets are
  non-negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-03"/>
          <updated date="2026-03-03"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-19.el9" test_ref="oval:com.tuxcare.clsa:tst:1772559514007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772721745" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2025-8194</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772721745" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772721745" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>- CVE-2025-8194: tarfile: validate archives to ensure member offsets are
  non-negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-24.el9" test_ref="oval:com.tuxcare.clsa:tst:1772721745007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773240322" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2025-6075</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773240322" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1773240322" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>- CVE-2025-6075: fix quadratic complexity in os.path.expandvars()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-11"/>
          <updated date="2026-03-11"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-25.el9" test_ref="oval:com.tuxcare.clsa:tst:1773240322007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776434771" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2026-4519</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776434771" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776434771" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>- CVE-2026-4519: reject leading dashes in webbrowser.open() URLs to prevent command-line option injection in browser subprocesses</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-20.el9" test_ref="oval:com.tuxcare.clsa:tst:1776434771007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777047108" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2026-4519</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777047108" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777047108" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>- CVE-2026-4519: reject leading dashes in webbrowser.open() URLs to prevent command-line option injection in browser subprocesses</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-24"/>
          <updated date="2026-04-24"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="important" public="20260320">CVE-2026-4519</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-27.el9" test_ref="oval:com.tuxcare.clsa:tst:1777047108007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777390475" version="1">
      <metadata>
        <title>alt-python36: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777390475" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777390475" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <description>- CVE-2024-0450: zipfile raises BadZipFile on quoted-overlap archive
  entries to prevent high-ratio zip bombs
- CVE-2026-6100: use-after-free in lzma/bz2 decompressors when a
  MemoryError leaves a stale next_in pointer on a re-used decompressor</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-21.el9" test_ref="oval:com.tuxcare.clsa:tst:1777390475007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777478783" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2026-6100</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777478783" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777478783" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2020-27619" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <reference ref_id="CVE-2021-3177" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" source="CVE"/>
        <reference ref_id="CVE-2021-4189" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" source="CVE"/>
        <description>- CVE-2026-6100: NULL bzs-&gt;next_in in error paths in
  BZ2Decomp_decompress.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-29"/>
          <updated date="2026-04-29"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" impact="critical" public="20201022">CVE-2020-27619</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" impact="critical" public="20210119">CVE-2021-3177</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-252" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" impact="moderate" public="20220824">CVE-2021-4189</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-29.el9" test_ref="oval:com.tuxcare.clsa:tst:1777478783007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777630510" version="1">
      <metadata>
        <title>alt-python27: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777630510" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777630510" source="CLSA"/>
        <reference ref_id="CVE-2024-6923" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>- CVE-2026-1299: email.Generator now rejects header *values* containing
  CR/LF that are not followed by folding whitespace by raising
  HeaderWriteError. In Python 2.7 (which lacks BytesGenerator) this
  single Generator-class hardening covers both upstream CVE-2026-1299
  and CVE-2024-6923.
- CVE-2024-6923: email.Generator now rejects header *names* containing
  CR/LF that are not followed by folding whitespace by raising
  HeaderWriteError, preventing header injection through the header
  name.
- CVE-2024-0397: ssl.SSLContext.cert_store_stats and get_ca_certs now
  deep-copy the X509_STORE under X509_STORE_lock (via a backport of
  OpenSSL 3.3's X509_STORE_get1_objects), fixing a memory race when an
  SSLContext is shared across threads.
- CVE-2021-28861: BaseHTTPServer now collapses any leading run of '/'
  in the request path to a single '/' to prevent an open-redirect via
  //evil.example/... URIs in 301 Location headers.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" impact="moderate" public="20240801">CVE-2024-6923</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-30.el9" test_ref="oval:com.tuxcare.clsa:tst:1777630510007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777637454" version="1">
      <metadata>
        <title>alt-python36: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777637454" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777637454" source="CLSA"/>
        <reference ref_id="CVE-2024-4032" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>- CVE-2026-1299: email.BytesGenerator now refuses to serialize headers
  that are unsafely folded or contain unfolded newlines, closing a
  header-injection bypass of CVE-2024-6923 (also includes the
  CVE-2024-6923 prerequisite hardening of the string Generator)
- CVE-2024-0397: ssl.SSLContext.cert_store_stats() and get_ca_certs()
  now correctly lock the certificate store via a backported
  X509_STORE_get1_objects shim, fixing a memory race when an
  SSLContext is shared across threads
- CVE-2024-4032: ipaddress is_private/is_global now classify addresses
  per the IANA special-purpose registries (192.0.0.0/24 with 192.0.0.9
  and 192.0.0.10 exceptions, 64:ff9b:1::/48, 2002::/16, and the
  2001::/23 sub-range exceptions)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-440" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" impact="important" public="20240617">CVE-2024-4032</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-22.el9" test_ref="oval:com.tuxcare.clsa:tst:1777637454007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778161965" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2026-3446</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778161965" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778161965" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>- CVE-2026-3446: binascii.a2b_base64 / base64.b64decode no longer abort the
  decoder loop on the first padded quad. The pad character is treated as
  non-alphabet data per RFC 4648 section 3.3, so excess data after the
  padding is decoded instead of being silently dropped.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-23.el9" test_ref="oval:com.tuxcare.clsa:tst:1778161965007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748352587014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778245330" version="1">
      <metadata>
        <title>alt-python27: Fix of CVE-2026-3446</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 9</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778245330" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778245330" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>- CVE-2026-3446: binascii.a2b_base64 / base64.b64decode no longer abort the
  decoder loop on the first padded quad. The pad character is treated as
  non-alphabet data per RFC 4648 section 3.3, so excess data after the
  padding is decoded instead of being silently dropped.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-08"/>
          <updated date="2026-05-08"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:centos:9</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330001"/>
        <criterion comment="alt-python27 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881002"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330002"/>
        <criterion comment="alt-python27-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881004"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330003"/>
        <criterion comment="alt-python27-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881006"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330004"/>
        <criterion comment="alt-python27-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881008"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330005"/>
        <criterion comment="alt-python27-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881010"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330006"/>
        <criterion comment="alt-python27-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881012"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-31.el9" test_ref="oval:com.tuxcare.clsa:tst:1778245330007"/>
        <criterion comment="alt-python27-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1753804881014"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36 isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-debug isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-devel isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-libs isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-test isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-tkinter isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-6.el9" id="oval:com.tuxcare.clsa:tst:1748352587013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-tools isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748352587014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-7.el9" id="oval:com.tuxcare.clsa:tst:1749037854007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-8.el9" id="oval:com.tuxcare.clsa:tst:1753205878007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205878001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27 isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-debug isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-devel isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-libs isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-test isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-tkinter isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-14.el9" id="oval:com.tuxcare.clsa:tst:1753804881013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753804881001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python27-tools isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1753804881014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748352587002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-16.el9" id="oval:com.tuxcare.clsa:tst:1754039871007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754039871001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-20.el9" id="oval:com.tuxcare.clsa:tst:1760098218007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760098218001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-21.el9" id="oval:com.tuxcare.clsa:tst:1760369183007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760369183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-13.el9" id="oval:com.tuxcare.clsa:tst:1762528386007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762528386001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-16.el9" id="oval:com.tuxcare.clsa:tst:1771339135007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771339135001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-22.el9" id="oval:com.tuxcare.clsa:tst:1772111352007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772111352001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-17.el9" id="oval:com.tuxcare.clsa:tst:1772139704007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772139704001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-23.el9" id="oval:com.tuxcare.clsa:tst:1772188508007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772188508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-18.el9" id="oval:com.tuxcare.clsa:tst:1772446514007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-19.el9" id="oval:com.tuxcare.clsa:tst:1772559514007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772559514001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-24.el9" id="oval:com.tuxcare.clsa:tst:1772721745007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772721745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-25.el9" id="oval:com.tuxcare.clsa:tst:1773240322007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773240322001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-20.el9" id="oval:com.tuxcare.clsa:tst:1776434771007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776434771001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-27.el9" id="oval:com.tuxcare.clsa:tst:1777047108007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777047108001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-21.el9" id="oval:com.tuxcare.clsa:tst:1777390475007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777390475001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-29.el9" id="oval:com.tuxcare.clsa:tst:1777478783007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777478783001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-30.el9" id="oval:com.tuxcare.clsa:tst:1777630510007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777630510001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-22.el9" id="oval:com.tuxcare.clsa:tst:1777637454007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777637454001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-23.el9" id="oval:com.tuxcare.clsa:tst:1778161965007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748352587013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778161965001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-31.el9" id="oval:com.tuxcare.clsa:tst:1778245330007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1753804881013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778245330001"/>
    </red-def:rpminfo_test>
  </tests>
  <objects>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587001" version="1">
      <red-def:name>alt-python36</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587003" version="1">
      <red-def:name>alt-python36-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587005" version="1">
      <red-def:name>alt-python36-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587007" version="1">
      <red-def:name>alt-python36-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587009" version="1">
      <red-def:name>alt-python36-test</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587011" version="1">
      <red-def:name>alt-python36-tkinter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748352587013" version="1">
      <red-def:name>alt-python36-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881001" version="1">
      <red-def:name>alt-python27</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881003" version="1">
      <red-def:name>alt-python27-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881005" version="1">
      <red-def:name>alt-python27-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881007" version="1">
      <red-def:name>alt-python27-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881009" version="1">
      <red-def:name>alt-python27-test</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881011" version="1">
      <red-def:name>alt-python27-tkinter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1753804881013" version="1">
      <red-def:name>alt-python27-tools</red-def:name>
    </red-def:rpminfo_object>
  </objects>
  <states>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748352587001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-6.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748352587002" version="1">
      <red-def:signature_keyid operation="equals">d07bf2a08d50eb66</red-def:signature_keyid>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1749037854001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-7.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753205878001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-8.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753804881001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-14.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1754039871001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-16.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760098218001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-20.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760369183001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-21.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1762528386001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-13.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771339135001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-16.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772111352001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-22.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772139704001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-17.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772188508001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-23.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772446514001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-18.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772559514001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-19.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772721745001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-24.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773240322001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-25.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1776434771001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-20.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1777047108001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-27.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1777390475001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-21.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1777478783001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-29.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1777630510001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-30.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1777637454001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-22.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1778161965001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-23.el9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1778245330001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.18-31.el9</red-def:evr>
    </red-def:rpminfo_state>
  </states>
</oval_definitions>
