<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:linux="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-05-13T14:36:27</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1756829197" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2019-9674</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1756829197" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1756829197" source="CLSA"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <description>* SECURITY UPDATE: Denial of service via a ZIP bomb
     - debian/patches/CVE-2019-9674.patch: add pitfalls to zipfile module
       documentation
     - CVE-2019-9674</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-02"/>
          <updated date="2025-09-02"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-11" test_ref="oval:com.tuxcare.clsa:tst:1756829197007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759252040" version="1">
      <metadata>
        <title>Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759252040" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1759252040" source="CLSA"/>
        <reference ref_id="CVE-2019-17514" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" source="CVE"/>
        <description>* SECURITY UPDATE: DOS, buffer overflow in SHA3, Possible Bypass Blocklisting
     Redirection vulnerability in http.server, regex DOS, Quadratic complexity,
     pathname quoting for venv
     - debian/patches/CVE-2022-37454.patch: fix a buffer overflow in
       Modules/_sha3/kcp/KeccakSponge.inc, Lib/test/test_hashlib.py
       (LP: #1995197).
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
       in Lib/encodings/idna.py, Lib/test/test_codecs.py.
     - debian/patches/CVE-2023-24329.patch: enforce
       that a scheme must begin with an alphabetical ASCII character
       in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
       start stripping C0 control and space chars in `urlsplit`
     - debian/patches/CVE-2021-28861.patch: Fix an open
       redirection vulnerability in the `http.server` module
       when an URI path starts with `//`
     - debian/patches/CVE-2024-6232.patch: Fix header parsing vulnerability that
       could lead to ReDoS
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in parsing
       "-quoted cookie values with backslashes
     - debian/patches/CVE-2024-9287.patch: Quote template strings in `venv` activation
     - CVE-2022-37454
     - CVE-2022-45061
     - CVE-2023-24329
     - CVE-2021-28861
     - CVE-2024-6232
     - CVE-2024-7592
     - CVE-2024-9287</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-30"/>
          <updated date="2025-09-30"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-682" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" impact="important" public="20191012">CVE-2019-17514</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759252040007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759510328" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2019-20907, CVE-2019-9674</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759510328" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1759510328" source="CLSA"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <description>* SECURITY UPDATE: zip bomb vulnerability in Lib/zipfile.py
     - debian/patches/CVE-2019-9674.patch: add pitfalls to zipfile module
       documentation
     - CVE-2019-9674
   * SECURITY UPDATE: Infinite loop
     - debian/patches/CVE-2019-20907.patch: avoid infinite loop in the
       tarfile module in Lib/tarfile.py, Lib/test/test_tarfile.py.
     - CVE-2019-20907</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-03"/>
          <updated date="2025-10-03"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510328008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760094018" version="1">
      <metadata>
        <title>Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760094018" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760094018" source="CLSA"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2022-48560" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2021-3737" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2022-48565" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in case of malicious XML entity declarations
     - debian/patches/CVE-2022-48565.patch: reject XML entity declarations
       in plist files
     - CVE-2022-48565
   * SECURITY UPDATE: Bypassing blocklisting methods by supplying a URL
     that starts with blank characters
     - debian/patches/CVE-2023-24329.patch,
       debian/patches/CVE-2023-24329-2.patch: prevent urllib.parse.urlparse
       from accepting schemes that don't begin with an alphabetical ASCII
       character
     - CVE-2023-24329
   * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
     - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
       tarfile
     - CVE-2024-6232
   * SECURITY UPDATE: Excessive CPU usage while parsing a cookie value
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
       parsing double-quoted cookie values with backslashes
     - CVE-2024-7592
   * SECURITY UPDATE: CPU DoS by crafting inputs to the IDNA decoder
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna
       decoding
     - CVE-2022-45061
   * SECURITY UPDATE: Use-after-free via heappushpop in heapq
     - debian/patches/CVE-2022-48560.patch: fix posible crash in heapq with
       custom comparison operators
     - debian/patches/CVE-2022-48560-2.patch: add tests for CVE-2022-48560
     - CVE-2022-48560
   * SECURITY UPDATE: DoS by HTTP client infinite line reading from
     malicious server after a 100 Continue response
     - debian/patches/CVE-2021-3737.patch: stop reading a header if it's
       too long
     - CVE-2021-3737
   * SECURITY UPDATE: A flaw in the urllib.parse module
     - debian/patches/CVE-2022-0391.patch: make urlparse sanitize URLs
       containing ASCII newline and tabs
     - CVE-2022-0391</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" impact="important" public="20200713">CVE-2019-20907</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" impact="important" public="20230822">CVE-2022-48560</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" impact="important" public="20220304">CVE-2021-3737</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" impact="critical" public="20230822">CVE-2022-48565</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760094018008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760367154" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2007-4559, CVE-2023-27043, CVE-2023-40217</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760367154" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760367154" source="CLSA"/>
        <reference ref_id="CVE-2007-4559" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" source="CVE"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <description>* SECURITY UPDATE: Overwriting of arbitrary files by remote attackers
     - debian/patches/CVE-2007-4559.patch: implement PEP 706 - a filter in
       the tarfile module to prevent directory traversal vulnerability
     - CVE-2007-4559
   * SECURITY UPDATE: Bypass of domain e-mail-based protection mechanism by
     incorrect parsing of e-mail addresses that contain a special character
     - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
       email.parseaddr()
     - CVE-2023-27043
   * SECURITY UPDATE: Bypass of the TLS handshake and included protections
     - debian/patches/CVE-2023-40217.patch: check for &amp; avoid the ssl
       pre-close flaw
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" impact="moderate" public="20070828">CVE-2007-4559</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-17" test_ref="oval:com.tuxcare.clsa:tst:1760367154007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760369318" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2020-26116, CVE-2020-8492</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760369318" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760369318" source="CLSA"/>
        <reference ref_id="CVE-2020-26116" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" source="CVE"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in regular expression because of
     urllib.request.AbstractBasicAuthHandler catastrophic backtracking
     - debian/patches/CVE-2020-8492.patch: fix DoS in the urllib regexp
     - CVE-2020-8492
   * SECURITY UPDATE: a header injection vulnerability for http methods
     in the httplib
     - debian/patches/CVE-2020-26116.patch: prevent header injection in
     http methods in httplib
     - CVE-2020-26116</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:P/A:N" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" impact="important" public="20200927">CVE-2020-26116</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" impact="moderate" public="20200130">CVE-2020-8492</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369318008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760707724" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760707724" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760707724" source="CLSA"/>
        <reference ref_id="CVE-2022-48566" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" source="CVE"/>
        <reference ref_id="CVE-2021-23336" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <reference ref_id="CVE-2021-3733" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" source="CVE"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <description>* SECURITY UPDATE: Web cache poisoning vulnerability
     - debian/patches/CVE-2021-23336.patch: fix web cache poisoning
       via urllib.parse.parse_qsl and urllib.parse.parse_qs
     - CVE-2021-23336
   * SECURITY UPDATE: Regular expression denial of service
     - debian/patches/CVE-2021-3733.patch: fix flaw in urllib’s
       AbstractBasicAuthHandler that could lead to a denial of service
       by leveraging a regular expression
     - CVE-2021-3733
   * SECURITY UPDATE: Constant-time-defeating optimisations issue
     - debian/patches/CVE-2022-48566.patch: make compare_digest more
       constant-time
     - CVE-2022-48566
   * SECURITY UPDATE: Incorrect parsing of email addresses containing special
     characters
     - debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by
       adding optional 'strict' parameter to getaddresses() and parseaddr()
       functions
     - CVE-2023-27043
   * SECURITY UPDATE: TLS handshake bypass
     - debian/patches/CVE-2023-40217.patch: Check for &amp; avoid the ssl
       pre-close flaw. Update SSL tests
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-17"/>
          <updated date="2025-10-17"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" impact="moderate" public="20230822">CVE-2022-48566</cve>
          <cve cvss2="4.0/AV:N/AC:H/Au:N/C:N/I:P/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" impact="moderate" public="20210215">CVE-2021-23336</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" impact="moderate" public="20220310">CVE-2021-3733</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760707724008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1762526748" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1762526748" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1762526748" source="CLSA"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517
   * TEST UPDATE: Incorrect encoding leading to an unexpected
     exception in test_tarfile.py
     - debian/patch/fix_test_tarfile-enconding.patch: fix encoding</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-07"/>
          <updated date="2025-11-07"/>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762526748007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1765796146" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-6597</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2025:1765796146" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1765796146" source="CLSA"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" source="CVE"/>
        <description>* SECURITY UPDATE: Ability to modify permissions with privileged programs
     - debian/patches/CVE-2023-6597: prevent tempfile.TemporaryDirectory
       class dereference symlinks
     - CVE-2023-6597</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-15"/>
          <updated date="2025-12-15"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765796146007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771338926" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771338926" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771338926" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771338926007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771870052" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771870052" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771870052" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell commands injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-23"/>
          <updated date="2026-02-23"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771870052008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772100444" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772100444" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772100444" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in the mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell command injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772100444007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772106165" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772106165" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772106165" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772106165008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772445876" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772445876" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772445876" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445876007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772556630" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772556630" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772556630" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-03"/>
          <updated date="2026-03-03"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772556630007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772701743" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772701743" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772701743" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772701743008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773233047" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773233047" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1773233047" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: replace character-by-character loop
       with regex-based substitution to fix quadratic complexity
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-11"/>
          <updated date="2026-03-11"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773233047008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776436576" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776436576" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776436576" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776436576008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776437741" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776437741" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776437741" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776437741007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777391472" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0450, CVE-2026-6100</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777391472" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777391472" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <description>* SECURITY UPDATE: zipfile quoted-overlap zip bomb
     - debian/patches/CVE-2024-0450.patch: raise BadZipFile when an
       archive entry overlaps with another entry or the central
       directory, preventing quoted-overlap zip bombs with extreme
       compression ratios.
     - CVE-2024-0450
   * SECURITY UPDATE: use-after-free in lzma/bz2 decompressors
     - debian/patches/CVE-2026-6100.patch: null next_in at the error:
       label of decompress() in Modules/_bz2module.c and
       Modules/_lzmamodule.c so the decompressor cannot be re-used
       with a stale buffer pointer after a MemoryError.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777391472007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777479481" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-6100</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777479481" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777479481" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2020-27619" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <reference ref_id="CVE-2021-3177" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" source="CVE"/>
        <reference ref_id="CVE-2021-4189" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" source="CVE"/>
        <description>* SECURITY UPDATE: use-after-free in
     BZ2Decompressor when MemoryError is raised in the C-level
     decompress() helper
     - debian/patches/CVE-2026-6100.patch: defensively null
       bzs-&gt;next_in on the error: path of BZ2Decomp_decompress in
       Modules/bz2module.c.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-29"/>
          <updated date="2026-04-29"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" impact="critical" public="20201022">CVE-2020-27619</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" impact="critical" public="20210119">CVE-2021-3177</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-252" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" impact="moderate" public="20220824">CVE-2021-4189</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777479481008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777624309" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2021-28861, CVE-2024-0397, CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777624309" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777624309" source="CLSA"/>
        <reference ref_id="CVE-2024-6923" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: header injection via newline in email.Generator
     - debian/patches/CVE-2026-1299.patch: add HeaderWriteError exception
       to Lib/email/errors.py, add NEWLINE_WITHOUT_FWSP regex to
       Lib/email/generator.py and check the header *value* in all four
       branches of Generator._write_headers(), raising HeaderWriteError
       when a CR/LF without folding whitespace is found. Updates
       test_embedded_header_via_string_rejected to expect
       HeaderWriteError instead of HeaderParseError. In Python 2.7 this
       single Generator-class hardening covers both upstream
       CVE-2026-1299 (BytesGenerator) and CVE-2024-6923 because
       BytesGenerator does not exist in 2.7.
     - CVE-2026-1299
   * SECURITY UPDATE: missing header-name newline check in email.Generator
     - debian/patches/CVE-2024-6923.patch: add NEWLINE_WITHOUT_FWSP check
       on the header *name* at the top of Generator._write_headers() in
       Lib/email/generator.py, raising HeaderWriteError when a CR/LF
       without folding whitespace is found in the header name. Documents
       HeaderWriteError in Doc/library/email.errors.rst and adds a
       test_invalid_header_format regression test in
       Lib/email/test/test_email_renamed.py.
     - CVE-2024-6923
   * SECURITY UPDATE: ssl.SSLContext data race in cert_store_stats /
     get_ca_certs
     - debian/patches/CVE-2024-0397.patch: backport of upstream 3.8
       commit 29c97287d2 ("[3.8] gh-114572: Fix locking in
       cert_store_stats and get_ca_certs"). Adds a polyfill of
       OpenSSL 3.3's X509_STORE_get1_objects() (deep-copy under
       X509_STORE_lock()) and replaces the shared, unlocked
       X509_STORE_get0_objects() calls in cert_store_stats() and
       get_ca_certs() in Modules/_ssl.c, preventing a memory race
       and potential use-after-free when an SSLContext is shared
       across multiple threads.
     - CVE-2024-0397
   * SECURITY UPDATE: open redirect in BaseHTTPServer when path starts
     with //
     - debian/patches/CVE-2021-28861.patch: backport of upstream commit
       4abab6b603 ("gh-87389: Fix an open redirection vulnerability in
       http.server"). In Lib/BaseHTTPServer.py, after the request line
       is parsed, collapse any leading run of '/' characters to a
       single '/' so an attacker-controlled '//evil.example/...' path
       cannot become an absolute scheme-less URI in a 301 Location
       header. Adds a regression test in Lib/test/test_httpservers.py.
     - CVE-2021-28861</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" impact="moderate" public="20240801">CVE-2024-6923</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777624309008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777636448" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0397, CVE-2024-4032, CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777636448" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777636448" source="CLSA"/>
        <reference ref_id="CVE-2024-4032" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: email BytesGenerator header injection
     - debian/patches/CVE-2026-1299.patch: verify generated headers in
       email.generator.BytesGenerator and Generator. Adds the
       HeaderWriteError exception, NEWLINE_WITHOUT_FWSP /
       NEWLINE_WITHOUT_FWSP_BYTES regexes, and the
       Policy.verify_generated_headers attribute, then raises
       HeaderWriteError when the folded header does not end with the
       policy linesep or contains a stray newline. Includes the
       CVE-2024-6923 prerequisite hardening of the string Generator.
     - CVE-2026-1299
   * SECURITY UPDATE: ssl.SSLContext memory race in cert_store_stats /
     get_ca_certs
     - debian/patches/CVE-2024-0397.patch: backport the upstream
       X509_STORE_get1_objects shim and the x509_object_dup helper
       from cpython 29c97287d205bf2f410f4895ebce3f43b5160524, then
       switch _ssl__SSLContext_cert_store_stats_impl and
       _ssl__SSLContext_get_ca_certs_impl to take a deep-copy snapshot
       of the X509_STORE under lock, freeing the snapshot before
       returning. Closes a use-after-free triggered by loading
       certificates concurrently from another thread.
     - CVE-2024-0397
   * SECURITY UPDATE: ipaddress is_private / is_global misclassification
     - debian/patches/CVE-2024-4032.patch: backport upstream
       gh-113171 / gh-65056. Update Lib/ipaddress.py to align the
       _private_networks lists with the IANA special-purpose registries
       and add _private_networks_exceptions so that
       is_private / is_global no longer misclassify addresses in
       192.0.0.0/24 (with 192.0.0.9 and 192.0.0.10 exceptions),
       64:ff9b:1::/48, 2002::/16, and the 2001::/23 sub-range
       exceptions (2001:1::1, 2001:1::2, 2001:3::/32, 2001:4:112::/48,
       2001:20::/28, 2001:30::/28). Includes the matching docs and
       test updates.
     - CVE-2024-4032</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-440" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" impact="important" public="20240617">CVE-2024-4032</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777636448007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778160562" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778160562" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778160562" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64_impl no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" for inputs that do not satisfy
       `quad_pos + pads == 4`. The unused `binascii_find_valid` helper
       is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778160562007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778165597" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Ubuntu 22.04 LTS</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778165597" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778165597" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64 no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" for inputs that do not satisfy
       `quad_pos + pads == 4`. The unused `binascii_find_valid` helper
       is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778165597008"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-11" id="oval:com.tuxcare.clsa:tst:1756829197007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1756829197001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759252040007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759252040001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510328008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510328001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760094018008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760094018001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-17" id="oval:com.tuxcare.clsa:tst:1760367154007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760367154001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369318008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369318001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760707724008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760707724001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762526748007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762526748001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765796146007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765796146001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771338926007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771338926001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771870052008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870052001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772100444007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772100444001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772106165008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772106165001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445876007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772445876001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772556630007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772556630001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772701743008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772701743001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773233047008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773233047001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776436576008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776436576001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776437741007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776437741001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777391472007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777391472001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777479481008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777479481001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777624309008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777624309001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777636448007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1777636448001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778160562007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1756829197007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778160562001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778165597008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510328008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1778165597001"/>
    </linux:dpkginfo_test>
  </tests>
  <objects>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197001" version="1">
      <linux:name>alt-python36</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197002" version="1">
      <linux:name>alt-python36-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197003" version="1">
      <linux:name>alt-python36-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197004" version="1">
      <linux:name>alt-python36-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197005" version="1">
      <linux:name>alt-python36-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197006" version="1">
      <linux:name>alt-python36-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1756829197007" version="1">
      <linux:name>alt-python36-tools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328001" version="1">
      <linux:name>alt-python27</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328002" version="1">
      <linux:name>alt-python27-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328003" version="1">
      <linux:name>alt-python27-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328004" version="1">
      <linux:name>alt-python27-idle</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328005" version="1">
      <linux:name>alt-python27-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328006" version="1">
      <linux:name>alt-python27-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328007" version="1">
      <linux:name>alt-python27-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510328008" version="1">
      <linux:name>alt-python27-tools</linux:name>
    </linux:dpkginfo_object>
  </objects>
  <states>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1756829197001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-11</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1759252040001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-14</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1759510328001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-3</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760094018001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-6</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760367154001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-17</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760369318001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-7</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760707724001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-8</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1762526748001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-19</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1765796146001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-20</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771338926001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-23</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771870052001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-9</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772100444001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-25</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772106165001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-10</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772445876001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-27</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772556630001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-28</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772701743001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-11</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1773233047001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-12</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776436576001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-14</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776437741001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-29</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777391472001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-30</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777479481001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-16</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777624309001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-17</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777636448001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-31</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778160562001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-32</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778165597001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-18</linux:evr>
    </linux:dpkginfo_state>
  </states>
</oval_definitions>
